1,210 research outputs found
Recommended from our members
The Limits of Location Privacy in Mobile Devices
Mobile phones are widely adopted by users across the world today. However, the privacy implications of persistent connectivity are not well understood. This dissertation focuses on one important concern of mobile phone users: location privacy.
I approach this problem from the perspective of three adversaries that users are exposed to via smartphone apps: the mobile advertiser, the app developer, and the cellular service provider. First, I quantify the proportion of mobile users who use location permissive apps and are able to be tracked through their advertising identifier, and demonstrate a mark and recapture attack that allows continued tracking of users who hide these identifiers. Ninety-five percent of the 1500 devices we tested were susceptible to this attack. We successfully identified 49% of unlabelled impressions from iOS devices, and 59% from Android, with a budget of only $5 per day, per user. Next, I evaluate an attack wherein a remote server discovers a user\u27s traveled path without permission, simply by analyzing the throughput of the connection to the user over time. In these experiments, a remote attacker can distinguish a user\u27s route among four paths within a University campus with 77% accuracy, and among eight paths surrounding the campus with 83% accuracy. I then propose a protocol for anonymous cell phone usage, which obviates the need for users to trust telecoms with their location, and I evaluate its efficacy against a passive location profiling attack used to infer identity. According to these simulations, even one day is enough to identify one device from among over a hundred with greater than 50% accuracy. To mitigate location profiling attacks, users should change these identifiers every ten minutes and remain offline for 30 seconds, to reduce their identifiability by up to 45%. I conclude by summarizing the key issues in mobile location privacy today, immediate steps that can be taken to improve them, and the inherent privacy costs of remaining constantly connected
Indoor navigation systems based on data mining techniques in internet of things: a survey
© 2018, Springer Science+Business Media, LLC, part of Springer Nature. Internet of Things (IoT) is turning into an essential part of daily life, and numerous IoT-based scenarios will be seen in future of modern cities ranging from small indoor situations to huge outdoor environments. In this era, navigation continues to be a crucial element in both outdoor and indoor environments, and many solutions have been provided in both cases. On the other side, recent smart objects have produced a substantial amount of various data which demands sophisticated data mining solutions to cope with them. This paper presents a detailed review of previous studies on using data mining techniques in indoor navigation systems for the loT scenarios. We aim to understand what type of navigation problems exist in different IoT scenarios with a focus on indoor environments and later on we investigate how data mining solutions can provide solutions on those challenges
Wearable devices and IoT applications for symptom detection, infection tracking, and diffusion containment of the COVID-19 pandemic: a survey
Until a safe and effective vaccine to fight the SARS-CoV-2 virus is developed and available for the global population, preventive measures, such as wearable tracking and monitoring systems supported by Internet of Things (IoT) infrastructures, are valuable tools for containing the pandemic. In this review paper we analyze innovative wearable systems for limiting the virus spread, early detection of the first symptoms of the coronavirus disease COVID-19 infection, and remote monitoring of the health conditions of infected patients during the quarantine. The attention is focused on systems allowing quick user screening through ready-to-use hardware and software components. Such sensor-based systems monitor the principal vital signs, detect symptoms related to COVID-19 early, and alert patients and medical staff. Novel wearable devices for complying with social distancing rules and limiting interpersonal contagion (such as smart masks) are investigated and analyzed. In addition, an overview of implantable devices for monitoring the effects of COVID-19 on the cardiovascular system is presented. Then we report an overview of tracing strategies and technologies for containing the COVID-19 pandemic based on IoT technologies, wearable devices, and cloud computing. In detail, we demonstrate the potential of radio frequency based signal technology, including Bluetooth Low Energy (BLE), Wi-Fi, and radio frequency identification (RFID), often combined with Apps and cloud technology. Finally, critical analysis and comparisons of the different discussed solutions are presented, highlighting their potential and providing new insights for developing innovative tools for facing future pandemics
Measuring Large-Scale Social Networks with High Resolution
This paper describes the deployment of a large-scale study designed to measure human interactions across a variety of communication channels, with high temporal resolution and spanning multiple years-the Copenhagen Networks Study. Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1 000 individuals, using state-of-the-art smartphones as social sensors. Here we provide an overview of the related work and describe the motivation and research agenda driving the study. Additionally, the paper details the data-types measured, and the technical infrastructure in terms of both backend and phone software, as well as an outline of the deployment procedures. We document the participant privacy procedures and their underlying principles. The paper is concluded with early results from data analysis, illustrating the importance of multi-channel high-resolution approach to data collection
Recommended from our members
e-mission: an open source, extensible platform for human mobility systems
Transportation is the single largest source of carbon emissions in the US. Decarbonizing it is challenging because it depends on individual behaviors, which in turn, depend on local land use planning. The interdisciplinary field of Computational Mobility, focusing on collecting, analysing and influencing human travel behavior, can frame solutions to this challenge.Innovation flows in interdisciplinary fields are bi-directional. The flow to the domain is focused on building a strong foundation for methodological improvements. As the improvements are deployed, they result in use-inspired computational research. This temporal dependency results in our initial focus on the modularity, accuracy and reproducibility of e-mission, an extensible platform for instrumenting human mobility. This open source platform has a modular architecture that supports power efficient duty cycling using virtual sensors, a read-only data model and a pipeline with novel algorithm adaptations for smartphone sensing.We also perform the first empirical evaluations of smartphone-based platforms in this domain. The architectural evaluation is based on three real world deployments: a classic travel diary, a crowdsourcing initiative, and a behavioral study. The accuracy evaluation is based on an novel procedure that uses artificial trips and multiple parallel phones to mitigate concerns over privacy, context sensitive power consumption and inherent sensing error. Data collected from three artifical timelines was used to evaluate the trajectory, segmentation and classification accuracies vs. power for various configurations.On computational side, challenges derived from the deployments can contribute to ongoing CS research in privacy, trustworthiness, incentivization and decision making. On the mobility side, this enables methodological innovations such as Agile Urban Planning for prototyping infrastructure changes
The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia
Conference Foreword
This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, and I would like to take this opportunity to thank the conference committee for their tireless efforts in this regard. These efforts have included but not been limited to the reviewing and editing of the conference papers, and helping with the planning, organisation and execution of the conference. Particular thanks go to those international reviewers who took the time to review papers for the conference, irrespective of the fact that they are unable to attend this year.
To our sponsors and supporters a vote of thanks for both the financial and moral support provided to the conference. Finally, to the student volunteers and staff of the ECU Security Research Institute, your efforts as always are appreciated and invaluable. Yours sincerely, Conference Chair Professor Craig Valli Director, Security Research Institut
- …